Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Service Model to Combat New, Uglier Threats in 04

    Written by

    Larry Seltzer
    Published November 25, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Its hard to say that 2003 has been a good year for security, but conscientious IT staff can feel good about their odds in the battle for security. You can protect yourself. But the arms race with attackers is getting nasty, and 2004 will be harder.

      Theres no doubt in my mind that the biggest problem with computers these days is spam. Its a problem that everyone has to deal with, even if its managed to the point where its just an annoyance. Dont expect the problem to be solved; expect the spam problem and the e-mail worm problem to converge. Weve begun to see this happening in phishing worms like MIMAIL that contain special, disguised worm applications. MIMAIL, Sobig and the other major worms of 2003 indicate a growing level of sophistication among the top attack writers. The other major trend that will continue to manifest in 2004, and which parallels the evolution of legitimate software development, is increased ease-of-use of attack development tools.

      From the standpoint of the vermin who write these things, MIMAIL is clearly an improved, next-generation worm. Why write a worm that just attacks and spreads? Why not write one that also creates the possibility of collecting personal information to sell? From the distribution standpoint, unlike older phishing attacks that just send you to a fake company site, MIMAIL redistributes itself.

      Im impressed enough with this technique to make a prediction: If easy development tools for apps like MIMAIL can be made available, look for conventional spammers to start using them (to my knowledge, this hasnt happened yet). The application wouldnt be an explicit scam, just the usual vulgar penis-enhancing stuff, but it would have several big advantages.

      First, it would self-propagate; any ad like this should search all files in the system in slow motion, so as not to raise attention, and distribute to all of them. Second, because its a native application as opposed to a simple Web page, it would have full freedom to create even richer content to catch the readers eye. For example, why not throw in a little DirectX game? Third, once youve installed an executable like this, youre probably able to install facilities to receive instructions from the Internet without having the user run another attachment. In fact, modern protocols like Web services would suit this very well.

      Next page: Instant Messaging: Cause for Concern?

      2

      One new area where security companies expect attacks to develop is in instant messaging. There have already been some minor efforts at this, but Im not as sure that this will develop into a major problem. All traffic on the major IM networks flows through central servers, an obvious point to monitor for attacks, and security products have begun to monitor these channels. Still, its a tempting target for attackers, especially for those targeting kids. There have already been several worms that attack through IRC (Internet Relay Chat), but because this is not a centralized service, its a far easier target.

      The good news is, as eWEEK Labs predicts, that if youre conscientious and intelligent about it, you can protect yourself against all of this, or at least a very high percentage of it. In almost every case, IT departments had a minimum of several weeks between the release of a patch and the release of the exploit. (In fact, ironically its often the patch that drives the exploit, as attackers reverse-engineer the patch as a quick and dirty path to the exploit.) Even if they dont always keep up to date because its tedious and users resist it, IT personnel know that services at all levels—especially the desktop itself—should be locked down except where necessary. Now even Microsoft is learning this lesson.

      Over the past several years Microsoft has been dragged, kicking and screaming, into the lockdown paradigm, and this will develop further with Service Pack 2 of Windows XP and Service Pack 1 of Windows Server 2003, both of which were announced at the recent Microsoft Professional Developers Conference and should hit the streets in 2004. Despite a sincere effort to make Windows Server 2003 secure out of the box, it wasnt too long before the RPC buffer overflow bug and subsequent Blaster worm showed that even the 2003 version was too open. But the new service packs, if theyre everything Microsoft has indicated, could help a great deal. For the first time, new Windows computers in default configuration could be impervious to any attacks they are likely to meet.

      But like most improvements built only into new versions of Windows, these will take years to have a significant impact. Consider what happened with mail clients: In the wake of Melissa and ILOVEYOU, the two pioneering mail worms, Microsoft imposed severe lockdown restrictions in its mail clients, blocking API access to the address book without explicit user permission and stripping all executable attachments. For years now, the only users subject to the most successful mail worms are those running non-Microsoft clients and old, unpatched versions of Outlook and Outlook Express. I actually expect the worm problem to abate slowly over time as a higher and higher percentage of consumers move to new computers with newer mail clients; most business users have some protection at the gateway, even if they continue to run old, vulnerable mail clients.

      Next page: The War Against Spam

      2

      This year brought us many state laws against spam, and it appears that Congress is on the verge of passing legislation. I sure hope Im wrong, but dont look for this law to cut the amount of spam in 2004 (or 2005, 2006, 2007… should I go on?). The spam problem is not the result of mail sent by the sort of legitimate marketers who would obey such a law.

      Even if spam should be illegal, because fraud should be illegal, the law is not going to solve the problem. Some say that the solution to the spam problem, as well as to other problems such as mail worms, is user education. And just like a law against forged mail headers, user education is an undeniably good thing and can help. But its not going to solve the problem in 2004, or anytime soon, because all it takes is a few unsophisticated users to keep these problems alive.

      If technology is all thats left to work with, what will be the leading technologies in 2004? As it has been for years, my bet is still with the service model. Companies like Postini and MessageLabs can completely outsource portions of the security model for an enterprise or even an ISP. The current year saw growth in this model in both the business and consumer space, as ISPs began taking on many security-related tasks centrally. Since this is the only model that can make a big dent in the growth of Internet-based attacks, I expect it to continue to grow in 2004. Eventually I expect and hope that ISP accounts that dont at least offer spam and threat protection will be untenable in the market, if not actually illegal.

      Check out eWEEK Labs Director Jim Rapozas security predictions for 2004.

      Yes, illegal. One day people will realize that even if they take all the precautions they can, there are still oblivious suckers out there running infected systems that are dumping all over everyone else. Perhaps ISPs should be expected to provide a safe environment, rather than letting users fend for themselves. I can see some legislature requiring ISPs to provide that. Probably not in 2004, but before too long. And theres a law that could make a difference.

      Discuss this in the eWEEK forum.

      Security Center Editor Larry Seltzer has worked in and written about the compute industry since 1983.

      Check back on eWEEK.com tomorrow for our predictions on storage and servers, followed by mobile computing and open source on Friday, collaboration and Web services on Saturday, and networking on Sunday.

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.